Preface Formal Aspects of Security (FASec) was held at Royal Holloway, University of London, 18-20 December 2002. The occasion celebrated a Jubilee, namely the 25thanniversaryoftheestablishmentofBCS-FACS,theFormalAspectsofC- puting Science specialist group of the British Computer Society. FASec is one of a series of events organized by BCS-FACS to highlight the use of formal me- ods, emphasize their relevance to modern computing, and promote their wider application. As the architecture model of information systems evolves from - connected PCs,throughintranet (LAN) and internet (WAN), to mobile internet and grids, security becomes increasingly critical to all walks of society: c- merce, ?nance, health, transport, defence and science. It is no surprise therefore that security is one of the fastest-growing research areas in computer science. Theaudience ofFASec includes thosein the formalmethods community who have(orwouldliketodevelop)adeeper interestinsecurity,andthoseinsecurity who would like to understand how formal methods can make important cont- butions to some aspects of security.
The scope of FASec is deliberately broad andcoverstopics that rangefrommodelling securityrequirementsthroughsp- i?cation, analysis, and veri?cations of cryptographic protocols to certi?ed code. The discussions at FASec 2002 encompassed many aspects of security: from theoretical foundations through support tools and on to applications. Formal methods has made a substantial contribution to this exciting ?eld in the past.
Les mer
This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Formal Aspects of Security, FASec 2002, held in London, UK, in December 2002.The 11 revised full papers presented together with 7 invited contributions were carefully reviewed, selected, and improved for inclusion in the book.
Les mer
Keynote Talk.- Lifting Reference Monitors from the Kernel.- Invited Talks I.- Authenticity Types for Cryptographic Protocols.- Verifying the SET Protocol: Overview.- Protocol Verification.- Interacting State Machines: A Stateful Approach to Proving Security.- Automatic Approximation for the Verification of Cryptographic Protocols.- Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis.- Invited Talks II.- Critical Critical Systems.- Analysing Security Protocols.- Analysis of Protocols.- Analysis of Probabilistic Contract Signing.- Security Analysis of (Un-) Fair Non-repudiation Protocols.- Modeling Adversaries in a Logic for Security Protocol Analysis.- Security Modelling and Reasonning.- Secure Self-certified Code for Java.- Z Styles for Security Properties and Modern User Interfaces.- Invited Talks III.- Cryptographic Challenges: The Past and the Future.- TAPS: The Last Few Slides.- Intrusion Detection Systems and Liveness.- Formal Specification for Fast Automatic IDS Training.- Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area.- Revisiting Liveness Properties in the Context of Secure Systems.
Les mer
Springer Book Archives
Springer Book Archives
Includes supplementary material: sn.pub/extras
Produktdetaljer
ISBN
9783540206934
Publisert
2003-12-03
Utgiver
Vendor
Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Høyde
235 mm
Bredde
155 mm
Aldersnivå
Research, P, 06
Språk
Product language
Engelsk
Format
Product format
Heftet